References
- Abrams, P. (1988). Notes on the difficulty of studying the state. Journal of Historical Sociology, 1(1), 58–89. https://doi.org/https://doi.org/10.1111/j.1467-6443.1988.tb00004.x
- Arghire, I. (2018). NSA-linked hacking tools ported to Metasploit. Security Week. https://www.securityweek.com/nsa-linked-hacking-tools-ported-metasploit
- Ben-Yehuda, N. (1986). The sociology of moral panics: Toward a new synthesis. The Sociological Quarterly, 27(4), 495–513. https://doi.org/https://doi.org/10.1111/j.1533-8525.1986.tb00274.x
- Bing, C., & Schectman, J. (2019). Inside the UAE’s secret hacking team of American mercenaries. Reuters. https://www.reuters.com/investigates/special-report/usa-spying-raven/
- Boland, R. J., & Tenkasi, R. V. (1995). Perspective making and perspective taking in communities of knowing. Organization Science, 6(4), 350–372. https://doi.org/https://doi.org/10.1287/orsc.6.4.350
- Bowker, G., & Star, S. L. (1999). Sorting things out: Classification and its consequences (inside technology). MIT Press.
- Carroll, P. (2009). Articulating theories of states and state formation. Journal of Historical Sociology, 22(4), 553–603. https://doi.org/https://doi.org/10.1111/j.1467-6443.2009.01369.x
- Carroll, P. (2012). Water and Technoscientific state formation in California. Social Studies of Science, 42(4), 489–516. https://doi.org/https://doi.org/10.1177/0306312712437977
- Centellas, K., Smardon, R., & Fifield, S. (2014). Calibrating translational cancer research: Collaboration without consensus in interdisciplinary laboratory meetings. Science, Technology, & Human Values, 39(3), 311–335. https://doi.org/https://doi.org/10.1177/0162243913505650
- Cohen, S. (1980). Folk devils and moral panics: The creation of the Mods and Rockers. St. Martin's Press.
- Coleman, E. G. (2010). The hacker conference: A ritual condensation and celebration of a lifeworld. Anthropological Quarterly, 83(1), 47–72. doi: https://doi.org/10.1353/anq.0.0112
- Constantin, L. (2012). NSA Chief asks hackers at Defcon for help securing cyberspace. PCWorld. https://www.pcworld.com/article/260007/nsa_chief_asks_hackers_at_defcon_for_help_securing_cyberspace.html
- Cowley, S. (2012). NSA wants to hire hackers. CNN Money. https://money.cnn.com/2012/07/27/technology/defcon-nsa/index.htm
- DEF CON 10. (2002). Defcon 10 – Wolves among us (1 of 7), https://www.youtube.com/watch?v=-jvHkbDcxmw
- Ellis, R., Huang, K., Siegel, M., Moussouris, K., & Houghton, J. (2018). Fixing a hole: The labor market for bugs. In H. Shrobe, D. L. Shrier, & A. Pentland (Eds.), New Solutions for cybersecurity (pp. 129–159). MIT Press.
- Farmer, D., & Venema, W. (1993). Improving the security of your site by breaking into it. https://cyberwar.nl/d/1993-FarmerVenema-comp.security.unix-Improving-the-Security-of-Your-Site-by-Breaking-Into-It.pdf
- Farrow, R. (2014). Interview with Dan Farmer. login, 39(6), 32–35. https://www.usenix.org/system/files/login/articles/login_dec14_07_farmer.pdf
- Fish, A., Murillo, L., Nguyen, T., Panofsky, A., & Kelty, C. (2011). Birds of the internet: Towards a field guide to participation and governance. Journal of Cultural Economy, 4(2), 157–187. https://doi.org/https://doi.org/10.1080/17530350.2011.563069
- Franks, J. (2010). Boundary organizations for sustainable land management: The example of Dutch environmental co-operatives. Ecological Economics, 70(2), 283–295. https://doi.org/https://doi.org/10.1016/j.ecolecon.2010.08.011
- Gasson, S. (2006). A genealogical study of boundary-spanning IS design. European Journal of Information Systems, 15(1), 26–41. https://doi.org/https://doi.org/10.1057/palgrave.ejis.3000594
- Gieryn, T. F. (1983). Boundary-work and the demarcation of science from non-science: Strains and interests in professional ideologies of scientists. American Sociological Review, 48(6), 781–795. https://doi.org/https://doi.org/10.2307/2095325
- Guston, D. H. (1999). Stabilizing the boundary between US politics and science: The role of the office of technology transfer as a boundary organization. Social Studies of Science, 29(1), 87–111. https://doi.org/https://doi.org/10.1177/030631299029001004
- Guston, D. H. (2001). Boundary organizations in environmental policy and science: An introduction. Science, Technology & Human Values, 26(4), 399–408. https://doi.org/https://doi.org/10.1177/016224390102600401
- HackerOne. (2019). The 2019 hacker report. HackerOne. https://www.hackerone.com/resources/the-2019-hacker-report
- HackerOne and Synack. (2016). Department of Defense Awards $7 Million Crowdsourced Security Contracts to HackerOne and Synack. Business Wire (Press Release). https://www.businesswire.com/news/home/20161020006521/en/Department-Defense-Awards-7-Million-Crowdsourced-Security
- Huvila, I. (2011). The politics of boundary objects: Hegemonic interventions and the making of a document. Journal of the American Society for Information Science and Technology, 62(12), 2528–2539. https://doi.org/https://doi.org/10.1002/asi.21639
- Kirkpatrick, D. (2018). Israeli Software helped Saudis spy on Khashoggi, lawsuit says. The New York Times. https://www.nytimes.com/2018/12/02/world/middleeast/saudi-khashoggi-spyware-israel.html?module=inline
- Kopfstein, J. (2012). NSA Trolls for Talent at Def Con, the Nation’s Largest Hacker Conference. The Verge. https://www.theverge.com/2012/8/1/3199153/nsa-recruitment-controversy-defcon-hacker-conference
- Kovacs, E. (2018). Singapore Government Announces Second Bug Bounty Program. Security Week. https://www.securityweek.com/singapore-government-announces-second-bug-bounty-program
- Levy, S. (2010). Hackers: Heroes of the computer Revolution. O’Reilly Media.
- Marczak, B., & Scott-Railton, J. (2016). The Million Dollar Dissident: NSO Group’s iPhone zero-days used against a UAE human rights defender. The Citizen Lab. https://citizenlab.ca/2016/08/million-dollar-dissident-iphone-zero-day-nso-group-uae/
- Marczak, B., Scott-Railton, J., McKune, S., Razzak, B. A., & Deibert, R. (2018). Hide and Seek: Tracking NSO Group’s Pegasus Software to Operation in 45 Countries, The Citizen Lab. https://citizenlab.ca/2018/09/hide-and-seek-tracking-nso-groups-pegasus-spyware-to-operations-in-45-countries/
- Maurer, T. (2018). Cyber Mercenaries: The state, hackers, and power. Cambridge University Press.
- Mayrl, D., & Quinn, S. (2016). Defining the state from within: Boundaries, Schemas, and Associational Policymaking. Sociological Theory, 34(1), 1–26. https://doi.org/https://doi.org/10.1177/0735275116632557
- Mazzetti, M., Goldman, A., Bergman, R., & Perlroth, N. (2019). A New Age of Warfare: How Internet Mercenaries do Battle for Authoritarian Governments. The New York Times. https://www.nytimes.com/2019/03/21/us/politics/government-hackers-nso-darkmatter.html
- McLaughlin, J. (2017). Deep Pockets, Deep Cover: The UAE is paying ex-CIA officers to build a spy empire in the Gulf. Foreign Policy. https://foreignpolicy.com/2017/12/21/deep-pockets-deep-cover-the-uae-is-paying-ex-cia-officers-to-build-a-spy-empire-in-the-gulf/
- Mello, J. P. (2013). “The Ban on Defcon Draws a Mixed Reaction.” CIO. https://www.cio.com/article/2384191/the-ban-on-feds-at-defcon-draws-a-mixed-reaction.html
- Midgal, J. S., & Schlichte, K. (2005). Rethinking the state. In J. S. Migdal (Ed.), The Dynamics of states: The Formation and Crises of state Domination (pp. 1–40). Routledge.
- Migdal, J. S. (2001). State in society: Studying how states and societies transform and constitute one another. Cambridge University Press.
- Mitchell, T. (1991). The Limits of the state: Beyond Statist approaches and their critics. American Political Science Review, 85(1), 77–96. https://doi.org/https://doi.org/10.1017/S0003055400271451
- Moore, H. D. (2011). Foreword. In D. Kennedy, J. O’Gorman, D. Kearns, & M. Aharoni (Eds.), Metasploit: The penetration tester’s Guide (pp. xiii–xv). No Starch Press.
- O’Donnell, L. (2019). EU Offers Bug Bounties for 14 Open Source Projects. Threat Post. https://threatpost.com/eu-offers-bug-bounties-for-14-open-source-projects/140473/
- Pelroth, N., & Shane, S. (2019). In Baltimore and beyond, a stolen NSA tool wreaks havoc. The New York Times. https://www.nytimes.com/2019/05/25/us/nsa-hacking-tool-baltimore.html
- Porter, J. (2019). Swiss E-Voting Trial Offers $150,000 in Bug Bounties to Hackers. The Verge. https://www.theverge.com/2019/2/12/18221570/swiss-e-electronic-voting-public-intrusion-test-hacking-white-hack-bug-bounties
- Poulsen, K. (2014). The FBI Used the Web's Favorite Hacking Tool to Unmask TOR Users. Wired. https://www.wired.com/2014/12/fbi-metasploit-tor/
- Ramirez-Silva, E., & Dacier, M. (2007). Empirical Study of the impact of Metasploit-related attacks in 4 years of attack Traces. In I. Cervesato (Ed.), Advances in computer science – ASIAN 2007. Computer and network security (pp. 198–211). Springer.
- Ribes, D. (2018). STS, Meet data science, Once Again. Science, Technology and Human Values, 44(3), 514–539. https://doi.org/https://doi.org/10.1177/0162243918798899
- Scott-Railton, J., Marczak, J. B., Guarnieri, C., & Crete-Nishihata, M. (2017). Bitter Sweet: Supporters of Mexico’s Soda Tax Targeted with NSO Exploit Links. The Citizen Lab. https://citizenlab.ca/2017/02/bittersweet-nso-mexico-spyware/
- Sheridan, K. (2018). Veterans Find New Roles in Enterprise Cyber Security. Dark Reading. https://www.darkreading.com/risk/veterans-find-new-roles-in-enterprise-cybersecurity/d/d-id/1333250
- Spence, J. (2017). Is a Melting Arctic making the Arctic Council Too Cool? Exploring the Limits to the effectiveness of a boundary organization. Review of Policy Research, 34(6), 790–811. https://doi.org/https://doi.org/10.1111/ropr.12257
- Star, S. L. (1988). The structure of ill-structured solutions: Boundary objects and heterogeneous distributed problem solving. In M. Huhns & L. Gasser (Eds.), Readings in distributed artificial intelligence (pp. 37–54). Kaufman.
- Star, S. L. (1989). Regions of the mind: Brain research and the quest for scientific certainty. Stanford University Press.
- Star, S. L. (2010). This is Not a boundary object Reflections on the origin of a concept. Science, Technology and Human Values, 35(5), 601–617. https://doi.org/https://doi.org/10.1177/0162243910377624
- Star, S. L., & Griesemer, J. (1989). Institutional ecology, ‘translations’, and boundary objects: Amateurs and professionals on Berkeley's museum of vertebrate zoology. Social Studies of Science, 19(3), 387–420. https://doi.org/https://doi.org/10.1177/030631289019003001
- Steinmetz, K. F. (2016). Hacked: A Radical approach to hacker culture and Crime. NYU Press.
- Sterling, B. (1992/2013). The hacker Crackdown: Law and Disorder on the Electronic Frontier. Trediton Classics.
- Vaas, L. (2018). Under the Hoodie: What Makes Bug Bounty Hunters Tick? Naked Security. https://nakedsecurity.sophos.com/2018/01/22/under-the-hoodie-the-ethical-hackers-keeping-you-running/
- Wang, R., Peng, N., Tao, X., & Quan, C. (2013). MetaSymploit: Day-One Defense Against Script-based Attacks with Security-Enhanced Symbolic Analysis. 22nd USENIX Security Symposium. http://enigma.usenix.org/sites/default/files/sec13_proceedings_interior.pdf#page=73
- Weber, M. (1992). The Protestant Ethic and the Spirit of capitalism. Routledge.
- Zetter, K. (2014). A convicted hacker and an internet icon join forces to thwart NSA Spying, Wired. https://www.wired.com/2014/07/dark-mail-hides-metadata-from-nsa/